Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,996,719 Optical polling platform methods, apparatuses and media
An image associated with a poll may be acquired via a camera. One or more symbols indicating responses may be found by analyzing the image. The responses...
US-9,996,718 Tag carriers and assemblies for RFID tags
Carriers and carrier assemblies for use in apparatus, such as tools, are provided. A carrier assembly generally includes a carrier and an RFID tag which may be...
US-9,996,717 Interrogator and interrogation system employing the same
The present invention is directed to an interrogator, method of discerning metal and radio frequency identification (RFID) objects, and an interrogation system...
US-9,996,716 Modulation index (depth) based grouping, addressing, and fingerprinting RFID tags
A method of addressing one or more RFID devices within a group of RFID devices includes transmitting a command to respond to the group at a first modulation...
US-9,996,715 Automatic mode detection in a dual operating mode RFID tag
A multi-mode, preferably dual mode, radio frequency identification (RFID) tag is adapted for automatic detection of whether a RFID reader located within...
US-9,996,714 Software-defined multi-mode RFID read devices
Devices and methods for reading multiple types of RFID tags having different frequencies and or encoding schemes are disclosed. One or more search signals...
US-9,996,713 Secure smartcard reader
A secure smartcard reader including a smartcard connector and a flexible printed circuit board wrapped around and at least partially surrounding the smartcard...
US-9,996,712 Self test device and method for wireless sensor reader
Disclosed is a self-test device and method for assessing the functional performance of a reader device that is configured to interface with a wireless sensor....
US-9,996,711 Asset protection of integrated circuits during transport
An integrated circuit (IC) provisioned for asset protection has a primary circuit portion, such as a microprocessor or system-on-chip, that can be selectively...
US-9,996,710 Security system for electronic device
The combination of an electronic device and a security system therefor. The electronic device has a first component with an upper surface and a second component...
US-9,996,709 Secure computer architecture
A secure computer architecture is provided. With this architecture, data is received, in a component of an integrated circuit chip implementing the secure...
US-9,996,708 SMS4 acceleration processors having encryption and decryption mapped on a same hardware
A processing system includes a processing core and a hardware accelerator communicatively coupled to the processing core. The hardware accelerator includes a...
US-9,996,707 Method and apparatus for destructing compromised devices
The system and method for destroying compromised objects, including electronic devices. The system and method utilizes a barrier separating two reagents that...
US-9,996,705 Determining potential sharing of private data associated with a private network domain to improve data security
Techniques for determining potential sharing of private data are described herein. The techniques may include identifying content having computer readable...
US-9,996,704 Privacy verification tool
Systems and methods for protecting the privacy of users by controlling access to the users' data. In particular, some embodiments provide for a higher-level...
US-9,996,703 Computer device and method for controlling access to a resource via a security system
A computer system 300 contains an agent 303 which modifies the ordinary behaviour of a native security system 103, such as to allow security decisions with...
US-9,996,702 System for and method of data processing in a computer-implemented system
A computer-implemented system for processing a user device request to process a user data portion, the system comprising a server having a processor, the...
US-9,996,701 Restrictive access of a digital object based on location
The present disclosure involves a method including: receiving a request to access an object from a user; prompting the user to go to a target location;...
US-9,996,700 Method and system for corrupting unwanted data in a communications stream
A system, method, and computer program for monitoring and corrupting a data stream, includes a data stream transmitting device having a barcode scanner that...
US-9,996,699 Method, electronic device and computer program product for screen shield
The present disclosure provides a screen shielding method, applied to a display device of an electronic device, wherein the display device has a display region,...
US-9,996,698 Automated management of confidential data in cloud environments
A shared networked storage may be separated from a key vault system. A storage request with data to be stored and the storage request with a confidentiality...
US-9,996,697 Methods and systems for blocking the installation of an application to improve the functioning of a mobile...
Methods and systems are provided for sharing information and improving the functioning of devices by blocking the installation of an application based on an...
US-9,996,696 Systems and methods to optimize execution of a software program using a type based self assembling control flow...
Using various embodiments, methods and systems to optimize the execution of a software program are disclosed. In one embodiment, a system is configured to...
US-9,996,695 Dynamic malware analysis of a URL using a browser executed in an instrumented virtual machine environment
Various techniques for performing malware analysis of a URL (e.g., a URL sample) using a browser executed in an instrumented virtual machine environment are...
US-9,996,694 Unsupervised detection of anomalous processes using hardware features
Disclosed are devices, systems, apparatus, methods, products, media and other implementations, including a method that includes obtaining current hardware...
US-9,996,693 Automated malware signature generation
Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of...
US-9,996,692 Method and system for using principal components analysis (PCA) to display trends in aircraft cyber events in...
A system, method, and computer readable media for using principal components analysis (PCA) to graphically display cyber event information about an aircraft or...
US-9,996,691 Using signals from developer clusters
Systems and techniques are provided for the mining signals from developer clusters in an application ecosystem and the creation of rules to proactively ban...
US-9,996,690 Binary translation of a trusted binary with input tagging
In an example, a computing device includes a trusted execution environment (TEE), including an enclave. The enclave may include both a binary translation engine...
US-9,996,689 Secure element for a telecommunications terminal
A secure element, for example an improved SIM card or the like, for a telecommunications terminal, such as a mobile telephone. The secure element may implement...
US-9,996,688 Systems and methods for controlling access to computer applications or data
Solutions for controlling access to computer applications or data are disclosed. For instance, certain systems advantageously secure access to applications and...
US-9,996,687 Authentication management
Disclosed aspects relate to authentication management. A first valid authentication input may be established with respect to access enablement to a computing...
US-9,996,686 Password retrieval system and method involving token usage without prior knowledge of the password
A method for managing a master password on a network device, the method stored as a set of instructions executable by a computer processor to: store the master...
US-9,996,685 Keyboard neutral authentication
A method of performing user authentication including the steps of receiving a password comprising a sequence of characters, accessing one or more alternative...
US-9,996,684 System and method for authorizing access to access-controlled environments
Systems and methods are provided for authorizing a user to access an access-controlled environment. The system includes a system server platform that...
US-9,996,683 Physiological response pin entry
Methods and systems are provided for facilitating the secure entry of a user's PIN for electronic transactions such as merchant checkout, payment authorization,...
US-9,996,682 Detecting and preventing illicit use of device
Illicit use of devices, and misappropriation of the data on those devices, may be prevented by detecting patterns of behavior that suggest illicit use, and by...
US-9,996,681 Mobile device access for medical devices
Methods for controlling a medical device using a software application on a mobile device are provided. In one aspect, a method includes receiving a request from...
US-9,996,680 Methods and related apparatus for managing access to digital assets
The apparatus disclosed herein, in various aspects, includes a digital asset, and an amulet that comprises an encrypted self-validating string. The amulet may...
US-9,996,679 Methods and apparatus for device authentication and secure data exchange between a server application and a device
In some embodiments, a method includes sending an authentication request to a client device to obtain a utilization code in response to a request from the...
US-9,996,678 Systems and methods for facilitating health research using a personal wearable device with research mode
Methods and systems for facilitating health research by utilizing one or more wearable sensor devices with a research mode are provided herein. Systems include...
US-9,996,677 System and method for obtaining an objective measure of dyspnea
A computer-implemented method for assessing a level of dyspnea in a patient is provided. The method includes measuring physical activity of the patient over a...
US-9,996,676 Associating an information reader and a medical device
A device agent including an information accessor for accessing association information obtained via an information reader. The association information includes...
US-9,996,675 Method to assign word class information
An assignment device (1) assigns word class information (WKI) to one or more words of text information (ETI). Based on word-class sequence information (WK-AI)...
US-9,996,674 Web site providing cosmetic and nutrition regimen from color images
A cosmetic regimen and/or a nutrition regimen is outputted almost instantly to a user who transmits a digital color image, preferably video, of the surface...
US-9,996,673 Method and system for monitoring intoxication
A method and system for monitoring a user's intoxication including receiving a set of signals, derived from a set of samples collected from the user at a set of...
US-9,996,672 Systems and methods of treatment using intervention and tasking determination
Devices, systems, and methods for use in managing patient treatments utilizing pharmaceutical or therapeutic compounds. Methods include accessing one or more...
US-9,996,671 Method for providing reliable non-invasive diagnostic tests
Method for providing a reliable non-invasive diagnostic test of the presence and/or severity of a disease, and associated software and expert system includes: ...
US-9,996,670 Clinical content analytics engine
Clinical content analytics engines and associated processes are described. An engine receives a clinical decision support document, accesses corresponding...
US-9,996,669 Intelligent discovery of medical devices by a programming system
Techniques for automatically identifying medical devices, e.g., implantable medical device, using wireless communications in order to communicate with the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.